Search

Advanced Search
Screen Reader users press Enter to Limit by product.  Limit by product
Screen Reader users press Enter to Limit by category.  Limit by category
Search Tips
Search filters applied
Category Remove
Home Email Spam

Search Results

Other Suggested Searches
Did you mean:
No results found.

Suggestions:
  • Make sure all words are spelled correctly
  • Use different words that mean the same thing
Results 1 - 10 of 24
Recommended Links
  1. Received an email but not sure if it's really from BT? Read more about "phishing" emails
    If you receive an email that appears to have been sent by BT with the either of following subject fields:   IMPORTANT: Alert about your BT Internet billing information on file or British...
    Date Updated: 18/05/2009
  2. 22/07/09: BT and Vodafone Agreement
    Consumers and small businesses in Ireland will benefit from greater competition and choice, following a strategic partnership agreed between BT and Vodafone.  The landmark contract will...
    Date Updated: 22/07/2009
  3. Q&A's regarding the BT and Vodafone Agreement
      Click here to read the full statement about the agreement between Vodafone and BT   What BT customers will transfer to Vodafone as part of this agreement?   This agreement involves...
    Date Updated: 22/10/2009
  4. Staying Secure - Online Fraud Information
    There are two common types of online fraud known as "Phishing" and "Trojan's".   What is Phishing?  Phishing is a type of online fraud, where you receive a hoax email or pop-up box directing you to a...
    Date Updated: 15/02/2008
  5. What is phishing and how can I stay protected online? Part 1
    What is phishing? Phishing is an illegal activity that occurs when online criminals (phishers) pretend to be legitimate organisations, like banks and credit card companies, in order to trick you into...
    Date Updated: 23/04/2008
  6. Protecting your computer against Viruses & Worms
    Computer Viruses A computer virus is merely a program that attaches itself to another program or data file in order to spread and reproduce itself without the knowledge of the user.   The effects of...
    Date Updated: 23/04/2008
  7. Knowing When to Trust an Email
    Email is a great way to keep in touch with other people. Unfortunately, it can also open your computer to security risks, computer viruses, and potentially malicious software if you're not careful...
    Date Updated: 23/04/2008
  8. What methods do spammers use?
    Receiving mail addressed to someone else . Although it may seem messages are being indirectly sent to you, in reality you are a victim of spam. What some spammers do is send a bulk mail to a false or...
    Date Updated: 12/02/2008
  9. Warning! Fraudulent Email Alert for Oceanfree Users
    Delete the Email and do NOT respond!   If you recently received emails similar to the those printed below you should delete it without responding or clicking on any website link. If you are...
    Date Updated: 15/10/2009
  10. Protect your identity online, part 2
      What risk does identity theft pose?   Your credit rating and reputation can be severely damaged. You may even find out that you have a criminal record for crimes you have never committed. You may...
    Date Updated: 23/04/2008